Identify and block apps known to be malicious and those with risky behaviors that may lead to spear-phishing attacks and expose sensitive data. Detect device exploits and dangerous Wi-Fi access points. Mobile Defense integrates with your MDM and EMM tools to protect your mobile users.
Detect and Control Risky Apps
Get a complete view of how apps in your environment are behaving—and complete control when they aren’t.
Mobile Defense protects devices against malicious code (such as xCodeGhost and iBackDoor) embedded in apps. Organizations need protection from cybercriminals who can take advantage of mobile users by targeting popular apps. For example, Proofpoint researchers recently discovered an infected (backdoored) Android app version of the mobile game Pokémon GO. Easy-to-read summaries show you the risk and reputation of installed apps; you decide how to respond through a connected MDM.
With Mobile Defense, you can detect malicious apps that have withstood app store vetting and have been published in public app stores. You can even detect apps that have passed app store reviews but have added malicious capabilities through updates and background downloads. We also help detect hidden privacy issues. These include apps that don’t provide privacy policies and those that use third-party code libraries that quietly send data to other countries.
Mobile Defense even protects against riskware—apps that aren’t overtly malicious but still pose compliance, data-loss, and privacy risks. These apps have usually passed app store views and often run rampant in bring-your-own-device (BYOD) settings.
See Where Apps Are Sending Your Data: Mobile Defense provides visibility into what apps in your environment are doing and where your potentially sensitive information is going.
Get Superior App Intelligence
Mobile Defense looks beyond individual apps for a complete view into the broader mobile threat landscape.
We start by analyzing each mobile application’s code, behavior, and dynamic operating attributes. Our powerful analysis engine checks for more than 1,000 malicious and privacy-leaking behaviors. The engine has sandboxed more than 20 million free and paid iOS and Android apps and assessed the reputation of more than 1 million app publishers. We also check publisher reputation, factoring in the historical risk of other apps from the same publisher.
From there, we examine how and where the app is communicating with the outside world—websites, servers, and third-party cloud services. Leveraging our global threat intelligence database, we correlate that traffic with a historical global database of malicious sites, servers, and command-and-control (C&C) networks. We flag and quarantine apps that connect to sites that host phishing or steal credentials, botnets or with servers hosted by cyber criminals.
Detect and Protect Against Wi-Fi Attacks
Detect Wi-Fi attacks and protect users against them with our optional client app for iOS and Android. Mobile Defense analyzes external Wi-Fi networks to detect attacks and risky configurations. These include man-in-the-middle attacks, SSL-stripping attacks, and content manipulation.
When someone connects to a risky or compromised Wi-Fi network, Mobile Defense alerts the user and system administrators.
Detect Device Anomalies and Threats
Our client app for iOS and Android detects device anomalies such as abnormal CPU usage, unknown configuration profiles, and file system tampering that can indicate zero-day threats. The app also looks for side-loaded and enterprise-signed apps that do not exist in app stores.
"It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Gartner Market Guide For Mobile Threat Defense Solutions, July 28, 2016, John Girard and Dionisio Zumerle (analysts)
Automate Controls and Workflows
Get full visibility and control for Android and iOS devices in enterprise environments.
The Mobile Defense Enterprise Console provides at-a-glance visibility into mobile threats in your environment. You see the overall enterprise app risk, which apps are malicious and risky, and where apps are sending and receiving data. You can set thresholds for risky app behavior and restrict specific activity.
And through API level integrations, you can sync with your MDM and EMM tools for continuous, automated protection. Easily enforce mobile policy, notify users and security teams about mobile threats, and quarantine affected devices. "The synergy between EMM and Mobile Threat Defense tools allow for risk mitigation base on real-time information and intelligence sharing.” Gartner Market Guide For Mobile Threat Defense Solutions, July 28, 2016, John Girard and Dionisio Zumerle (analysts)
Protect User Privacy
Mobile Defense offers several levels of control to help you comply with a wide range of worker privacy laws and workplace rules. You can configure Mobile Defense with the following privacy modes:
- Full Transparency: report all apps and which users’ devices they’re on
- Anonymized Apps: report apps anonymously, not linked to specific users
- Total Privacy: does not report individual apps—only whether an app on an employee’s device exceeds a policy threshold
Total Privacy mode is patent-pending. The technology leaves enterprises fully protected without revealing what apps are on employees’ devices. MDM app inventory can even be turned off.
Mobile Threat Assessment
Protect your organization from malicious apps with a complimentary threat assessment report of your mobile environment.
Support, Services & Training
We offer world-class support, services and training to maximize your investment.